Skip to main content

Modeling and Analysis of a Hybrid Authentication Protocol for VANET

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11065))

Included in the following conference series:

  • 2282 Accesses

Abstract

A policy mechanism of pseudonym exchange was established in VANET. The group signature is introduced as the identity attribute tag of the message which be used as a supplement to pseudonym. A white list mechanism is also proposed to avoid generate huge storage and cancellation overhead in the pseudonym signature scheme. The security and performance analysis show that the proposed protocol is feasible. In the storage overhead, authentication speed and robustness are superior to the traditional scheme. However, the increase of message length has little effect on packet loss rate and end-to-end delay. Compared to its performance in privacy protection and saving computational overhead, these effects can be ignored.

Supported in part by Science and Technology Cooperation Program of Guizhou Province, China under Grant LH20157763, in part by Science and technology plan project of Ministry of Housing and Urban-Rural Development, China under Grant 2016-K3-009.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, H.G., Han, W.B., Lai, X.J., et al.: Survey on cyberspace security. Sci. China Inf. Sci. 58(11), 1–43 (2015)

    MathSciNet  Google Scholar 

  2. Mokhtar, B., Azab, M.: Survey on security issues in vehicular ad hoc networks. AEJ – Alex. Eng. J. 54(4), 1115–1126 (2015)

    Article  Google Scholar 

  3. Mohammed, N.H.A., El-Moafy, H.N., Abdel-Mageid, S.M., et al.: Mobility management scheme based on smart buffering for vehicular networks. Int. J. Comput. Netw. Appl. 4(2), 35–46 (2017)

    Google Scholar 

  4. Liu, X., Zhang, Y., Wang, B., et al.: Mona: secure multi-owner data sharing for dynamic groups in the Cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182–1191 (2013)

    Article  Google Scholar 

  5. Joe, M.M., Ramakrishnan, B.: Review of vehicular ad hoc network communication models including WVANET (Web VANET) model and WVANET future research directions. Wirel. Netw. 22(7), 1–18 (2015)

    Google Scholar 

  6. Raya, M., Hubaux, J.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)

    Article  Google Scholar 

  7. Haas, J., Hu, Y., Laberteaux, K.: Design and analysis of a lightweight certificate revocation mechanism for VANET. In: Proceedings of 6th ACM International Workshop on Vehicular Inter-networking, New York, pp. 89–98 (2009)

    Google Scholar 

  8. Lin, X., Sun, X., Ho, P.H., et al.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)

    Article  Google Scholar 

  9. Dedicated short range communications (DSRC) [EB/OL] (2011). http://grouper.ieee.org/groups/scc32/dsrc/index.html

  10. Freudiger, J., Raya, M., Félegyházi, M., et al.: Mix-zones for location privacy in vehicular networks. In: ACM Workshop on Wireless Networking for Intelligent Transportation Systems (2007)

    Google Scholar 

  11. Zhu, X., Donghui, H., Hou, Z., et al.: A location privacy preserving solution to resist passive and active attacks in VANET. China Commun. 11(9), 60–67 (2014)

    Article  Google Scholar 

  12. Dahl, M., Delaune, S., Steel, G.: Formal analysis of privacy for vehicular mix-zones. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 55–70. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15497-3_4

    Chapter  Google Scholar 

  13. Freudiger, J., Shokri, R., Hubaux, J.P.: On the optimal placement of mix zones. In: PETS 2009, 216–234 (2009)

    Google Scholar 

  14. Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28628-8_3

    Chapter  Google Scholar 

  15. Hao, Y., Cheng, Yu., Chi, Z., et al.: A distributed key management framework with cooperative message authentication in VANETs. IEEE J. Sel. Areas Commun. 29(3), 616–629 (2011)

    Article  Google Scholar 

  16. Jung, Y.H., Li, Q.: Short dynamic group signature scheme supporting controllable linkabilityp. IEEE Trans. Inf. Forensics Secur. 32(6), 1–14 (2013)

    Google Scholar 

  17. Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: robust location privacy scheme for VANET. IEEE J. Sel. Areas Commun. 25(8), 1569–1589 (2007)

    Article  Google Scholar 

  18. Liu, Z., Liu, J., Wu, Q., et al.: Secure and efficient distributed pseudonym generation in VANET. J. Commun. 36(11), 33–40 (2015)

    Google Scholar 

  19. Chow, C.Y., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems, pp. 171–178. ACM (2006)

    Google Scholar 

  20. Li, M., Sampigethaya, K., Huang, L., et al.: Swing & swap: user-centric approaches towards maximizing location privacy. In: Proceedings of ACM WPES, pp. 19–28 (2006)

    Google Scholar 

  21. Lin, X., Sun, X., Wang, X., et al.: TSVC: timed efficient and secure vehicular communications with privacy preserving. IEEE Trans. Wirel. Commun. 7(12), 4987–4998 (2009)

    Article  Google Scholar 

  22. Zeng, S., Huang, Y., Liu, X.: Privacy-preserving communication for VANETs with conditionally anonymous ring signature. Int. J. Netw. Secur. 17(2), 135–141 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xu, Y., Wang, Z., Huang, L., Xie, X. (2018). Modeling and Analysis of a Hybrid Authentication Protocol for VANET. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00012-7_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00011-0

  • Online ISBN: 978-3-030-00012-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics